The protection of data against damage.
What is data Security?
The use of electronic communications to bully a person.
What is Cyber bullying?
Computers are now being used for jobs that were previously done by people.
What is loss of jobs?
Designs, creates and maintains the integrated database.
What is the role of a database administer?
A style of writing.
What is Font?
1.Minimal or no protection of computer systems from natural disaster.
2. Lack of protection from electrical power.
3. Terrorist activities that target computer systems.
What are External sources of computer Vulnerability?
1. Fearful of reporting incidents of cyber bullying.
2. Feeling of distraction.
3. Lack of interest and motivation.
4. Avoiding school.
What are the individual impacts of cyber bullying?
RSI, CVS, Back Pain, CVS, Stress
What are the health concerns of ICT?
Communicates with the public using social media to create and share content using social media platforms such as Twitter.
What is the role of a social media specialist?
Will examine your text and identify any spelling mistakes.
What is a Spellcheck?
A weakness or flaw in one ore more computer systems.
What is computer Vulnerability?
Use of computer systems to steal people's credit card information, date of birth and other personal details.
What is identity theft?
Working can now be accessed by employees in their location instead of by the more traditional method of travelling to work.
What is telecommuting?
Develops the applications that allow users to complete specific tasks on a computer or another device.
What is the role of a a software developer?
Displays the measurements, indents and tabs of your document.
What is a ruler?
The protection of hardware and software resources against accidental or deliberate damage, theft or corruption.
What is Computer Security?
The use of websites and email address that try to trick you into entering your personal information.
What is a phishing attack?
The widespread use of information systems has led to more efficient ways of working and to a decrease in the hours that many people spend on leisure pursuits.
What are social concerns of ICT?
Attends to any hardware faults and malfunctions in the equipment. Installs new systems and services computers.
What is the role of a Network Engineer?
A convenient way of grouping text in an organised manner. It is constructed of cells grouped in rows and columns.
What is a table?
Software that is owned by a commercial company and available for anyone to buy and use under license.
What is Proprietary Software?
This occurs when a computer system or network are overwhelmed with so much data and processing that it makes it difficult or impossible for legitimate users to access their computer system.
What is a Denial-of-service attack
A concern of having your work monitored by computers, and not be able to take proper breaks as you can always be contacted immediately.
What is stress?
Analyses systems currently in place to access their suitability for computerization or recommends upgrades for existing computer systems.
What is the role of a system analyst?
An application that automates jobs and reduces repetition. You create three documents one is a list f persons you want to write to.
What is Mail-merge?